Acknowledgement
This work was supported by Institute of Information & Communications Technology Planning & Evaluation (IITP) grant funded by the Korea Government (MSIT) (No.2022-0-00961).
References
- Kim, D. W., Lee, M. S., Jeong, J. Y., Kim, and H. C., "COVID19 Related Keyword Analysis: Based on Topic Modeling and Semantic Network Analysis," Journal of the Semiconductor & Display Technology, Vol. 21, No. 2, pp.127-132, 2022.
- Kang, Y. G., Yoo, J. D., Park, E.J., Kim, D. H., and Kim, H.K., "Design and Implementation of Cyber Attack Simulator based on Attack Techniques Modeling," Journal of the Korea Society of Computer and Information, Vol.25, pp.65-72, 2020. https://doi.org/10.9708/JKSCI.2020.25.03.065
- Taherdoost, H., "Understanding cybersecurity frameworks and information security standards-a review and comprehensive overview," Electronics, Vol. 11, pp. 2181, 2022.
- Lee, J. Y., Moon, D. S. and Kim, I. K., "Technological Trends in Cyber Attack Simulations." Electronics and Telecommunications Trends, Vol. 35, pp. 34-48, 2020.
- Rabie, A. R., Bassam, W. A., Jalawi, S. A., Abdullah, J. A., Ayman, E.S., and Mohamed, M. D., "Cybersecurity and Countermeasures at the Time of Pandemic", Journal of Advanced Transportation, Vol. 2021, pp. 1-19, 2021.
- Al-Qahtani, A. F., and Cresci, S., "The COVID-19 scamdemic: A survey of phishing attacks and their countermeasures during COVID-19," IET Information Security, Vol.16, pp.324-345, 2022. https://doi.org/10.1049/ise2.12073
- Singh, S., Sharma, P. K., Moon, S. Y., Moon, D. S., and Park, J. H., "A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions", The Journal of Supercomputing, Vol. 75, pp. 4543-4574, 2019. https://doi.org/10.1007/s11227-016-1850-4
- Choi,Y. K., Jang I. S., Whoang, I., Kim, T. G., Hong, S. J., Park, I. S., Yang, J. S., Kwon, Y. J., and Kang, J. M., "Design and Implementation of Cyber Range for Cyber Defense Exercise Based on Cyber Crisis Alert." Journal of the Korea Institute of Information Security & Cryptology, Vol. 30, pp. 805-821, 2020.
- Milian, E. Z., Spinola, M. D. M., and Carvalho, M. M., "Fintechs: A literature review and research agenda", Electronic Commerce Research and Applications, Vol. 34, 2019.
- Jiang, H., Choi, T., and Ko, R. K. L., "Pandora: A cyber range environment for the safe testing and deployment of autonomous cyber-attack tools," Security in Computing and Communications, Vol. 1364, pp. 1-20, 2021. https://doi.org/10.1007/978-981-16-0422-5_1
- Yamin, M. M., Katt, B., and Gkioulos, V., "Cyber ranges and security testbeds: Scenarios, functions, tools and architecture," Computers & Security, Vol. 88, pp. 101636, 2020.
- Yamin, M. M., and Katt, B., "Use of cyber attack and defense agents in cyber ranges: A case study," Computers & Security, Vol. 122, pp. 102892, 2022.
- Katina, P. F., and Keskin, O. F., "Complex system governance as a foundation for enhancing the cybersecurity of cyber-physical systems," International Journal of Cyber Warfare and Terrorism, Vol. 11, pp. 1-14, 2021. https://doi.org/10.4018/IJCWT.2021070101
- Kim, D. H., Kim, Y. H., Ahn, M. K., and Lee, H. J., "Automated cyber threat emulation based on ATT&CK for cyber security training," Journal of the Korea Society of Computer and Information, Vol. 25, pp. 71-80, 2020. https://doi.org/10.9708/JKSCI.2020.25.09.071
- Yoo, J. D., Park, E., Lee, G., Ahn, M. K., Kim, D., Seo, S., and Kim, H. K., "Cyber attack and defense emulation agents," Applied Sciences, Vol. 10, pp. 2140, 2020.
- Mohamed, N., "Study of bypassing Microsoft Windows Security using the MITRE CALDERA framework" F1000 Research, Vol. 11, pp. 16-25, 2022. https://doi.org/10.12688/f1000research.109148.3
- Sainadh, J., Navya, Y. S., Raja, P., Tagore, G., and Rao, G. R. K., "Dynamic Malware Analysis Using Cuckoo Sandbox", 2018 Second International Conference on Inventive Communication and Computational Technologies, pp. 1056-1060, 2018.
- Jjschwartz, "NetworkAttackSimulator (Version 0.9.1)." Retrieved August 12, 2021, from https://github.com/Jjschwartz/NetworkAttackSimulator (Publication Date: N/A).
- Microsoft, "CyberBattleSim (Version 2.4.0)." Retrieved August 26, 2021, from https://github.com/microsoft/CyberBattleSim.
- Walter, E., Ferguson-Walter, K., and Ridley, A., "Incorporating Deception into CyberBattleSim for Autonomous Defense." Retrieved May 18, 2023, from https://arxiv.org/abs/2108.13980, 2021.
- Xiang, X., Foo, S., and Zang, H., "Recent Advances in Deep Reinforcement Learning Applications for Solving Partially Observable Markov Decision Processes (POMDP) Problems Part 2 - Applications in Transportation, Industries, Communications and Networking and More Topics", Machine Learning and Knowledge Extraction, Vol. 3, pp. 863-878, 2021. https://doi.org/10.3390/make3040043